


default search action
International Journal of Network Management, Volume 34
Volume 34, Number 1, January/February 2024
RESEARCH ARTICLES
- Vankadhara Rajyalakshmi, Kuruva Lakshmanna

:
Detection of car parking space by using Hybrid Deep DenseNet Optimization algorithm. - Shengyi Yang

, Shaoying Zhu:
Thinking and exploration of the teaching mode of empirical accounting course based on the Internet of Things and deep learning. - Kyungchan Ko

, Taeyeol Jeong
, Jongsoo Woo
, James Won-Ki Hong
:
Survey on blockchain-based non-fungible tokens: History, technologies, standards, and open challenges. - Ziyu Qiu, Zhilei Zhou, Brad Niblett, Andrew Johnston, Jeffrey Schwartzentruber, Nur Zincir-Heywood, Malcolm I. Heywood

:
Assessing the impact of bag-of-words versus word-to-vector embedding methods and dimension reduction on anomaly detection from log files.
Volume 34, Number 2, March/April 2024
RESEARCH ARTICLES
- Kengo Arakawa, Eiji Oki

:
Availability-aware virtual network function placement based on multidimensional universal generating functions. - Anan Jin

, Yuhang Ye, Brian Lee
, Yuansong Qiao
:
Topology analysis of the Ripple transaction network. - Nedia Badri, Leïla Nasraoui, Leïla Azouz Saïdane:

A comprehensive review of blockchain integration in remote patient monitoring for E-health. - Udit Agarwal

, Vinay Rishiwal
, Sudeep Tanwar
, Mano Yadav:
Blockchain and crypto forensics: Investigating crypto frauds.
Volume 34, Number 3, May/June 2024
RESEARCH ARTICLES
- V. Karthik

, R. Lakshmi
, Salini Abraham
, M. Ramkumar
:
Residual based temporal attention convolutional neural network for detection of distributed denial of service attacks in software defined network integrated vehicular adhoc network. - Kavi Priya Dhandapani

, Mirnalinee Thanganadar Thangathai, Shahul Hamead Haja Moinudeen
:
A novel eviction policy based on shortest remaining time for software defined networking flow tables. - Najmun Nisa, Adnan Shahid Khan, Zeeshan Ahmad

, Johari Abdullah
:
TPAAD: Two-phase authentication system for denial of service attack detection and mitigation using machine learning in software-defined network. - Aeri Kim

, Meryam Essaid, Sejin Park, Hongtaek Ju
:
Reducing the propagation delay of compact block in Bitcoin network.
Volume 34, Number 4, July/August 2024
Editorial
- James Won-Ki Hong, Andreas G. Veneris, Hongtaek Ju, Taeyeol Jeong, Changhoon Kang:

Innovations in Blockchain for Crypto Assets and Exchanges.
Special Issue Paper
- Wonseok Choi, Jongsoo Woo, James Won-Ki Hong

:
Fractional non-fungible tokens: Overview, evaluation, marketplaces, and challenges. - Shange Fu, Qin Wang

, Jiangshan Yu, Shiping Chen:
Leveraging Ponzi-like designs in stablecoins. - Robert Henker

, Daniel Atzberger, Jan Ole Vollmer, Willy Scheibel
, Jürgen Döllner, Markus Bick:
Athena: Smart order routing on centralized crypto exchanges using a unified order book. - Srisht Fateh Singh

, Panagiotis Michalopoulos
, Andreas G. Veneris:
Deeper: A shared liquidity decentralized exchange design for low trading volume tokens to enhance average liquidity.
Volume 34, Number 5, September/October 2024
Editorial
- Laura Ricci, Moayad Aloqaily, Vinayaka Pandit:

Editorial for the IJNM Special Issue From the Best Papers of IEEE ICBC 2023 "Advancing Blockchain and Cryptocurrency".
Special Issue Paper
- Jack Nicholls

, Aditya Kuppa, Nhien-An Le-Khac
:
The next phase of identifying illicit activity in Bitcoin. - Novak Boskov

, Xingyu Chen, Sevval Simsek, Ari Trachtenberg, David Starobinski:
Out-of-band transaction pool sync for large dynamic blockchain networks. - Jens Leth Hougaard, Mohsen Pourpouneh

, Haiting Han
:
Transaction fee mechanisms with farsighted miners. - F. Javier Fernández-Bravo Peñuela

, Jordi Arjona Aroca
, Francesc D. Muñoz-Escoí
, Yuriy Yatsyk Gravrylyak, Ismael Illán García, José M. Bernabéu-Aubán:
DELTA: A Modular, Transparent, and Efficient Synchronization of DLTs and Databases. - Suvam Basak

, Satish Narayana Srirama
:
Fog computing out of the box: Dynamic deployment of fog service containers with TOSCA. - Ali Alqahtani, Surbhi Bhatia Khan:

An optimal hybrid cascade regional convolutional network for cyberattack detection.
Research Article
- Wesley dos Reis Bezerra

, Fernando Koch, Carlos Becker Westphall:
Performance of security options for message protocols: A comparative analysis. - S. Vidhya

, P. M. Siva Raja, R. P. Sumithra
:
Blockchain-Enabled Decentralized Healthcare Data Exchange: Leveraging Novel Encryption Scheme, Smart Contracts, and Ring Signatures for Enhanced Data Security and Patient Privacy.
Volume 34, Number 6, November/December 2024
Editorial
- Weizhi Meng, Sokratis K. Katsikas, Jiageng Chen

, Chao Chen:
Security, Privacy, and Trust Management on Decentralized Systems and Networks.
Special Issue Paper
- Xiangyu Cao

, Zhengjun Jing
, Xiaorong Zhao, Xiaolong Xu:
A security-enhanced equipment predictive maintenance solution for the ETO manufacturing. - Qiuhua Wang, Chuangchuang Li

, Dong Wang, Lifeng Yuan, Gaoning Pan, Yanyu Cheng
, Mingde Hu, Yizhi Ren:
IGXSS: XSS payload detection model based on inductive GCN. - Chao Zhang, Jinmei Zhang, Lijun Yun, Jun Zhang, Junbo Su:

Privacy-protected object detection through trustworthy image fusion. - Kayalvizhi Manikandan, Ramamoorthy Sriramulu:

ASMTP: Anonymous secure messaging token-based protocol assisted data security in swarm of unmanned aerial vehicles. - Xinyang Li

, Meng Zhao, Yong Ding, Changsong Yang, Huiyong Wang, Hai Liang, Yujue Wang:
Privacy-preserving data aggregation achieving completeness of data queries in smart grid. - Shubh Mittal, Tisha Chawla

, Saifur Rahman
, Shantanu Pal
, Chandan K. Karmakar
:
A secure and light-weight patient survival prediction in Internet of Medical Things framework. - Dongying Gao, Caiwei Guo, Yi Zhang, Wen Ji, Zhilei Lv, Zheng Li, Kunsan Zhang, Ruibin Lin:

Risk-Aware SDN Defense Framework Against Anti-Honeypot Attacks Using Safe Reinforcement Learning.
Research Article
- Renya Nath N, Hiran V. Nath:

A Generalized Lightweight Intrusion Detection Model With Unified Feature Selection for Internet of Things Networks. - Chandra Umakantham Om Kumar

, Suguna Marappan
, Bhavadharini Murugeshan
, P. Mercy Rajaselvi Beaulah
:
Intrusion Detection for Blockchain-Based Internet of Things Using Gaussian Mixture-Fully Convolutional Variational Autoencoder Model. - C. H. Sarada Devi

, Rimmi Anand
, R. Hemalatha, B. Uma Maheswari:
Duo-H: An Effectual Consensus Algorithm Using Two-Tier Shard Consortium Blockchain Mechanism for Enhanced Privacy Protection. - Chunhua Jin, Zhiwei Chen, Wenyu Qin, Kaijun Sun, Guanhua Chen, Liqing Chen:

A Blockchain-Based Proxy Re-Encryption Scheme With Cryptographic Reverse Firewall for IoV. - Yifan Liu, Heng Zhang, Yang Zhou, Kai Qi, Qingxiang Li:

Construction of Metaphorical Maps of Cyberspace Resources Based on Point-Cluster Feature Generalization.

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














